6. Defeating or attempting to defeat content filtering systems.
7. Stealing, using or disclosing another user’s password or code without authorization.
8. Using any network systems to actively engage in procuring or transmitting material
that is in violation of sexual harassment or hostile workplace laws, Canon Law, or
Diocesan rules and policies. This includes morally objectionable materials, files,
images, text or other content.
9. Security breaches or disruptions of network communication. Security breaches
include, but are not limited to, accessing data of which the employee is not an
intended recipient or logging into a server or account that the employee is not
expressly authorized to access, unless these duties are within the scope of regular
duties. For purposes of this section, "disruption" includes, but is not limited to,
network sniffing, pinged floods, packet spoofing, denial of service, and forged
routing information for malicious purposes.
10. Port scanning, intrusion detection or other security scanning is expressly prohibited
by anyone other than systems administrators charged with responsibility for system
security.
11. Executing any form of network monitoring which will intercept data not intended for
the employee's system, unless this activity is a part of the employee's normal
job/duty.
12. Circumventing user authentication or security of any host, system, network or
account, or disguising or attempting to disguise the identity of a host, system,
account, or service on the network.
13. Interfering with or denying service to any other user (for example, denial of service
attack.)
14. Using any program/script/command, or sending messages of any kind, with the
intent to interfere with, or disable, a user's terminal session, by any means, locally or
via the network.
15. Providing information about, or lists of, staff, students, or parishioners to parties
outside the diocese/parish/school.
16. Use of wireless access to network resources without prior written permission of the
technology administrators, principal or pastor.
17. Use of resources which are wasteful or which monopolize system resources at the
expense of other users.
18. Use of peer-to-peer file sharing software to access, share or trade any files.
19. Using internet for participation in Chat rooms or other web-based forums unrelated
to ministry, duties or studies.
20. Engaging in any other illegal activities.
Those who minister and work in pastoral settings must take great care to be consistent in
representing the worth of their character online. Clear communication and respect for
boundaries is needed at any level of contact. Emails, text messages, blog postings or